Search Website

Validating credentials, please wait...
  • General Inquiries 1-571-481-9307

  • Fax 1-202-315-3003

Home

Schedule

Schedule
Class Schedule of Courses
Mar
28
Tue
2017
Implementing Network Security 4 Day @ Arlington,Va
Mar 28 @ 9:00 am – Mar 31 @ 4:00 pm

In this course, students will learn how to implement practical solutions for identifying, assessing, and preventing external and internal threats to networks. Key components include security issues with various protocols, OS security, network device security, authentication methods, least privilege principal, web security, security policies, communication security and cryptography basics.

Modules
  1. OS security lockdown
  2. Network device security
  3. Exploitation prevention
  4. Web page security configuration
  5. Communication Security (focusing on protocols used for network and communications)
  6. Access control and authentication methods
  7. Security Policy and Principal of Least Privilege
  8. Basic network cryptography
Course Prerequisites

This class is intended for individuals with intermediate knowledge of information systems and systems security.

Course includes the following takeaway items:  a printed training book and a CD that includes reference materials pertaining to the course.

Certification

Every student participating will receive a certificate of successful participation in this course, which will allow you to claim hours of Continuous Professional Experience for your existing certifications.  Our Continuing Education Credits are accepted by ISC2, CompTIA and ISACA.

Apr
4
Tue
2017
Risk Management Framework (RMF) for Federal Systems Security Controls Assessors (SCA) 4 Day @ Arlington,Va
Apr 4 @ 8:30 am – Apr 7 @ 4:00 pm

This course provides an in-depth look at testing the controls using NIST SP 800-53A and ensuring the use of the Risk Management Framework (RMF) for Federal Security Systems. The focus of the course is an in-depth explanation of each NIST SP 800-53 Revision 3 controls to include what method should be used to test and validate each security control in accordance with NIST SP 800-53A and NIST SP 800-115, what evidence should be gathered, and how to more efficiently and effectively test Federal systems and infrastructure. The curriculum will introduce the independent tester or Validator to test the process for any of the Federal IA controls using manual and automated tests to ensure all controls are tested properly.

Apr
11
Tue
2017
Cloud Security Fundamentals & FedRAMP 3 Day @ Arlington,Va
Apr 11 @ 8:30 am – Apr 13 @ 4:00 pm

The 3-day Cloud Security and FedRAMP course provides students with an in-depth knowledge of cloud security requirements, cloud security issues, cloud computing architecture and security concepts for the three types of cloud computing: Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS), and explains what cloud service providers and agencies must do to understand the latest guidance provided by NIST and to meet the requirements for the Federal Risk and Authorization Management Program (FedRAMP).

Incident Response, Investigations & Network Forensics @ Kettering, OH
Apr 11 @ 8:30 am – Apr 14 @ 4:00 pm

Computer security incident response has become an important component of information technology (IT) programs. Cybersecurity-related attacks have become not only more numerous and diverse but also more damaging and disruptive. New types of security-related incidents emerge frequently. Preventive activities based on the results of risk assessments can lower the number of incidents, but not all incidents can be prevented. An incident response capability is therefore necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring IT services.

Lunarline’s four day, hands-on course will assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. Students will learn incident handling, particularly for analyzing incident-related data and determining the appropriate response. Students will gain an understanding of security tools and technologies available for incident response and network forensics through hands-on lab work.

Apr
18
Tue
2017
Risk Management Framework (RMF) for DoD & Intel Information Technology In-Depth 3 Day @ Arlington,Va
Apr 18 @ 8:30 am – Apr 20 @ 4:00 pm
Course Description

Lunarline offers the most comprehensive and detailed hands-on training for students who want to gain an understanding of the pending transition from DIACAP to RMF for DoD IT. Our training is based upon participation of our subject matter experts in transition working groups and direct experience with other Federal,Wa DoD and commercial clients. In compliance with the Federal Information Security Management Act (FISMA), Federal agencies and the Intelligence Community have already transitioned to the use of the NIST Risk Management Framework (RMF) as the foundation for their assessment and authorization (A&A) processes, formerly known as certification and accreditation (C&A). DoD is now in the process of establishing the regulatory foundation for their transition to the use of the NIST RMF. This training will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Risk Management Framework (RMF) for DoD & Intel Information Technology Intensity 4 Day @ Arlington,Va
Apr 18 @ 8:30 am – Apr 21 @ 4:00 pm

This course equips the student with an overview of the system authorization process (also known as C&A) and the Risk Management Framework (RMF) for National Security Systems (NSS).  In addition to the classroom instruction, the student will also participate in several scenario-based hands-on exercises in the implementation of the RMF using the CNSS and IC requirements to provide a clear knowledge bridge to the revised system authorization processes for those currently working with C&A for National Security Systems or for those who have limited or no C&A experience. These exercises will include the development of Systems Security Plans (SSPs), Security Assessment Reports (SARs), and Plans Of Action and Milestones (POA&Ms) for a NSS.  This course meets the requirements of National Security Directive 42 (NSD-42), which outlines the roles and responsibilities for securing NSSs. The CNSS In-Depth Course will address the Federal and Intelligence Community requirements, including NIST SP 800-37, NIST SP 800-39, and CNSS 1253.

 

The fourth day of this Intensity course provides each student with a hands on experience in using automated vulnerability assessment and other tools used to support the Federal and CNSS system authorization process.

 

Modules:

1:  Critical Definitions and Policies

2:   C&A Transformation/Transition Overview

3:   The IC and the Transformation

4:   Roles and Responsibilities

5:   Accreditation Boundary

6:   System Categorization

7:   Select Security Controls

8:   Implement, Document & Assess Security Controls

9:   Authorize Information System

10:  Monitor Information System

11:  Reciprocity

12:   Supporting Tools and Testing

13:   Certification Testing

 

Course Material

Students will be provided access to our online learning environment and will have 24/7 access to their course material. Students are required to bring a tablet or laptop with an installed modern web browser because exams and other exercises are conducted through the SCS online learning environment.

Students’ need to make sure that the system is properly configured with all the drivers necessary to utilize the tools required for the course exercises. You can use any 64‑bit version of Windows, Mac OSX, or Linux as your core operating system that also can install and run VirtualBox virtualization software. It is critical that your CPU and operating system support 64‑bit so that our 64‑bit guest virtual machine will run on your laptop. Please download and install the latest version of VirtualBox on your system prior to class beginning.

The course includes a VirtualBox image file of a guest Linux system that is larger than 12 GB. Therefore, you need a file system with the ability to read and write files that are larger than 3 GB, such as NTFS on a Windows machine.

MANDATORY SYSTEM HARDWARE REQUIREMENTS:

  • CPU: 64‑bit Intel i5 x64 2.0+ GHz processor or higher based system is mandatory for this class (Important ‑ Please Read: a 64‑bit system processor is mandatory)
  • RAM: 4 GB (Gigabytes) of RAM minimum (Note: We strongly recommend 8 GB of RAM or higher to
    get the most out of the course)
  • Host Operating System: Fully patched & updated Windows (7+), MAC OSX (10.10+), or recent
    version of Linux operating system (released 2014 or later) that also can install and run VirtualBox
    software. Please note: It is necessary to fully update your host operating system prior to the class to
    ensure you have the right drivers and patches installed to utilize the latest USB 3.0 devices. Those
    who use a Linux host must also be able to access ExFAT partitions using the appropriate kernel or
    FUSE modules.
  • Networking: Wireless 802.11 B, G, N, or AC
  • USB 3.0 Port(s) – highly recommended
  • 200+ Gigabyte Host System Hard Drive minimum
  • 150 Gigabytes of Free Space on your System Hard Drive – Free Space on Hard Drive is critical.
  • The student should have the capability to have Local Administrator Access within their host operating system and BIOS settings
Certifications:

You will receive your National Security Agency (NSA) and Committee on National Security Systems (CNSS) NSTISSI 4011, Information System Security Professional and CNSSI 4012, Senior IA System Manager Certificate.  As well as earning CPE’s to your existing certifications with CompTIA, ISC2 and ISACA.

 

Risk Management Framework (RMF) for Federal Systems Security Controls Assessors (SCA) 4 Day @ Kettering, OH
Apr 18 @ 8:30 am – Apr 21 @ 4:00 pm

This course provides an in-depth look at testing the controls using NIST SP 800-53A and ensuring the use of the Risk Management Framework (RMF) for Federal Security Systems. The focus of the course is an in-depth explanation of each NIST SP 800-53 Revision 3 controls to include what method should be used to test and validate each security control in accordance with NIST SP 800-53A and NIST SP 800-115, what evidence should be gathered, and how to more efficiently and effectively test Federal systems and infrastructure. The curriculum will introduce the independent tester or Validator to test the process for any of the Federal IA controls using manual and automated tests to ensure all controls are tested properly.

Risk Management Framework (RMF) for Federal Systems Security Controls Assessors (SCA) 4 Day @ Kettering, OH
Apr 18 @ 8:30 am – Apr 21 @ 4:00 pm

This course provides an in-depth look at testing the controls using NIST SP 800-53A and ensuring the use of the Risk Management Framework (RMF) for Federal Security Systems. The focus of the course is an in-depth explanation of each NIST SP 800-53 Revision 3 controls to include what method should be used to test and validate each security control in accordance with NIST SP 800-53A and NIST SP 800-115, what evidence should be gathered, and how to more efficiently and effectively test Federal systems and infrastructure. The curriculum will introduce the independent tester or Validator to test the process for any of the Federal IA controls using manual and automated tests to ensure all controls are tested properly.

Apr
25
Tue
2017
Risk Management Framework (RMF) for DoD & Intel Information Technology In-Depth 3 Day @ Kettering, OH
Apr 25 @ 8:30 am – Apr 27 @ 4:00 pm
Course Description

Lunarline offers the most comprehensive and detailed hands-on training for students who want to gain an understanding of the pending transition from DIACAP to RMF for DoD IT. Our training is based upon participation of our subject matter experts in transition working groups and direct experience with other Federal, DoD and commercial clients. In compliance with the Federal Information Security Management Act (FISMA), Federal agencies and the Intelligence Community have already transitioned to the use of the NIST Risk Management Framework (RMF) as the foundation for their assessment and authorization (A&A) processes, formerly known as certification and accreditation (C&A). DoD is now in the process of establishing the regulatory foundation for their transition to the use of the NIST RMF. This training will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Risk Management Framework (RMF) for DoD & Intel Information Technology Intensity 4 Day @ Kettering, OH
Apr 25 @ 8:30 am – Apr 28 @ 4:00 pm

This course equips the student with an overview of the system authorization process (also known as C&A) and the Risk Management Framework (RMF) for National Security Systems (NSS).  In addition to the classroom instruction, the student will also participate in several scenario-based hands-on exercises in the implementation of the RMF using the CNSS and IC requirements to provide a clear knowledge bridge to the revised system authorization processes for those currently working with C&A for National Security Systems or for those who have limited or no C&A experience. These exercises will include the development of Systems Security Plans (SSPs), Security Assessment Reports (SARs), and Plans Of Action and Milestones (POA&Ms) for a NSS.  This course meets the requirements of National Security Directive 42 (NSD-42), which outlines the roles and responsibilities for securing NSSs. The CNSS In-Depth Course will address the Federal and Intelligence Community requirements, including NIST SP 800-37, NIST SP 800-39, and CNSS 1253.

 

The fourth day of this Intensity course provides each student with a hands on experience in using automated vulnerability assessment and other tools used to support the Federal and CNSS system authorization process.

 

Modules:

1:  Critical Definitions and Policies

2:   C&A Transformation/Transition Overview

3:   The IC and the Transformation

4:   Roles and Responsibilities

5:   Accreditation Boundary

6:   System Categorization

7:   Select Security Controls

8:   Implement, Document & Assess Security Controls

9:   Authorize Information System

10:  Monitor Information System

11:  Reciprocity

12:   Supporting Tools and Testing

13:   Certification Testing

 

Course includes the following takeaway items:  a printed training book and a CD that includes reference materials pertaining to the course.

Certifications:

You will receive your National Security Agency (NSA) and Committee on National Security Systems (CNSS) NSTISSI 4011, Information System Security Professional and CNSSI 4012, Senior IA System Manager Certificate.  As well as earning CPE’s to your existing certifications with CompTIA, ISC2 and ISACA.

 

Risk Management Framework (RMF) for Federal Systems In-Depth 3 Day @ Arlington,Va
Apr 25 @ 8:30 am – Apr 27 @ 4:00 pm

Lunarline’s Federal Information Security Management Act (FISMA) training provides students with a fundamental knowledge of the requirements for meeting FISMA requirements, as well as an in-depth look of the Federal system authorization process and Risk Management Framework (RMF). This training equips the students with an in-depth indoctrination into the RMF and they will learn the requirements for managing risk, and ensuring that the confidentiality, availability and integrity of federal information and information systems is protected at a level commensurate with the security requirements of the information and the information system. Students will participate in a series of scenario-based hands-on exercises to enhance understanding of the processes used for system authorization, including all of the elements of the Risk Management Framework. These exercises will include the development of Systems Security Plans (SSPs), Security Assessment Reports (SARs), and Plans Of Action and Milestones (POA&Ms) for Federal Information Systems. This training is a CNSS approved course that deals with the new C&A transformation. Please note – this course has been aligned with NIST SP 800-37 Revision 1 and is the new process under the C&A transformation.

Risk Management Framework (RMF) for Federal Systems Intensity 4 Day @ Arlington,Va
Apr 25 @ 8:30 am – Apr 28 @ 4:00 pm

WashingtonLunarline’s Federal Information Security Management Act (FISMA) training provides students with a fundamental knowledge of the requirements for meeting FISMA requirements, as well as an in-depth look of the Federal system authorization process and Risk Management Framework (RMF). This training equips the students with an in-depth indoctrination into the RMF and they will learn the requirements for managing risk, and ensuring that the confidentiality, availability and integrity of federal information and information systems is protected at a level commensurate with the security requirements of the information and the information system. Students will participate in a series of scenario-based hands-on exercises to enhance understanding of the processes used for system authorization, including all of the elements of the Risk Management Framework. These exercises will include the development of Systems Security Plans (SSPs), Security Assessment Reports (SARs), and Plans Of Action and Milestones (POA&Ms) for Federal Information Systems. This training is a CNSS approved course that deals with the new C&A transformation. Please note – this course has been aligned with NIST SP 800-37 Revision 1 and is the new process under the C&A transformation.

May
2
Tue
2017
Ethical Hacking & Penetration Testing 4 Day @ Kettering, OH
May 2 @ 8:30 am – May 5 @ 4:00 pm

Vulnerability scanning and security audits alone will not ensure the security of an organization because they only test for currently known vulnerabilities with little to no analysis of how these vulnerabilities may be exploited. To ensure that systems are adequately protected, administrators must probe networks and assess the security posture for vulnerabilities and exposed surfaces while attempting to exploit them.  Penetration testing fills a vital organizational need by confirming information security policies are both adequate and sufficiently implemented to protect against novel attacks.

Network and Packet Analysis 4 Day – Hands-On @ Arlington,Va
May 2 @ 8:30 am – May 5 @ 3:30 pm

This course provides the student the concepts, methodologies, and hands-on tools to analyze network traffic for the purposes of focused operations, cyber operations, pen testing, intrusion detection, and incident response. Each student will be provided an overview on how packet analysis applies to their cyber security position.

May
9
Tue
2017
Network and Packet Analysis 4 Day – Hands-On @ Kettering, OH
May 9 @ 8:00 am – May 12 @ 5:00 pm

This course provides the student the concepts, methodologies, and hands-on tools to analyze network traffic for the purposes of focused operations, cyber operations, pen testing, intrusion detection, and incident response. Each student will be provided an overview on how packet analysis applies to their cyber security position.

$0.000 items